Containing Targeted Cyber Attacks: Best Practices for Gaining Control over the Enterprise Endpoint Environment

This white paper addresses the phases of the incident response process and some common pitfalls of their implementation. It also introduces the concept of a layered approach to cybersecurity and incident response including Endpoint Detection, Malware Hunting, and Deep Memory Forensics and their roles in every phase of the incident response process.